US6404862B1 - Authentication device - Google Patents
Authentication device Download PDFInfo
- Publication number
- US6404862B1 US6404862B1 US09/311,512 US31151299A US6404862B1 US 6404862 B1 US6404862 B1 US 6404862B1 US 31151299 A US31151299 A US 31151299A US 6404862 B1 US6404862 B1 US 6404862B1
- Authority
- US
- United States
- Prior art keywords
- smart card
- telephone
- authentication
- remote service
- telephone line
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
- H04M1/667—Preventing unauthorised calls from a telephone set
- H04M1/67—Preventing unauthorised calls from a telephone set by electronic means
- H04M1/675—Preventing unauthorised calls from a telephone set by electronic means the user being required to insert a coded card, e.g. a smart card carrying an integrated circuit chip
Definitions
- This invention relates to an authentication device for use over a telephone line.
- U.S. Pat. No. 5,406,619 describes a universal authentication device which is the size and shape of a credit card, and contains a microprocessor, keypad, LCD display, and audio interface for receiving and transmitting signals over a telephone line when the device is held close to the telephone earpiece or mouthpiece.
- the remote service sends a random challenge over the telephone line to the device.
- the device generates a response, e.g. by encrypting the challenge, and returns the response over the telephone line to the remote service.
- the remote service compares the response with the expected response, and if they match, authenticates the user.
- PCT Patent Application No. 95/04328 describes a portable hand-held device containing a microprocessor, keypad, LCD display, and audio interface for connection to a telephone line.
- the device also contains a receptor for an integrated circuit card (smart card).
- the device may be used for a large number of functions, controlled by program modules stored internally or on the smart card. One function provides identification of the user via the telephone, using a challenge and response mechanism.
- the object of the present invention is to provide an improved authentication device, which does not have these disadvantages.
- an authentication device comprises a hand-held unit having a receptacle for a smart card and an audio interface for communication with a telephone line to permit a challenge-and-response authentication procedure between the smart card and a remote service, the device being dedicated solely to said authentication procedure and having no display.
- the device is dedicated solely to the authentication procedure and has no display, it can be implemented very simply and cheaply.
- the device also has no keypad, allowing it to be implemented even more cheaply.
- FIGS. 1, 2 and 3 are front, side and back views of a first authentication device.
- FIG. 4 is a back view of an alternative form of the device.
- FIG. 5 is a front view of another alternative form of the device.
- the authentication device is a hand-held unit, comprising a main body 1 , with a flap 2 connected to the main body by a hinge 3 .
- the main body 1 has a slot 4 which can receive a smart card 5 .
- the device contains two flat audio transducers 6 , 7 which act as loudspeaker and microphone respectively.
- the loudspeaker 6 is mounted in the main body 6 , and in this example is a piezo-electric transducer.
- the microphone 7 is mounted in the flap 2 , and in this example is a sub-miniature electret device.
- the microphone 7 is slidable within a slot 8 to allow adjustment of the distance between the two transducers 6 and 7 .
- a light-emitting diode (LED) 9 is provided on the back of the flap 2 .
- the main body is 96 mm ⁇ 62.5 mm in size, and can receive an 85 mm ⁇ 52.5 mm smart card.
- the distance between the centres of the two transducers 6 and 7 can be adjusted in the range 96 mm to 140 mm.
- the device also contains electronics (not shown) for interfacing to the smart card and for sending and receiving information over the telephone connection by way of the audio transducers.
- these electronics provide a simple modem (modulator/demodulator) unit.
- the electronics, the LED, and also the smart card, are powered by a battery (not shown), housed within the device.
- the flap 2 When the device is not in use, the flap 2 is folded against the main body 1 , and in use it is folded outwards into the position as shown in FIGS. 1-3.
- the smart card 5 may normally be kept in its slot 4 when the device is not in use, so that the device acts as a wallet for protecting the card.
- Some form of seal (not shown) may be provided to prevent dirt from entering the slot 4 , which could foul the contacts for the card.
- Opening the device activates it, and the LED 9 starts flashing to indicate that the device is ready for use.
- the device remains activated for a predetermined time-out period, after which it is deactivated to conserve the battery.
- the device When the device is opened out into its in-use position, it can be placed over a telephone handset (not shown), with the loudspeaker 6 next to the telephone mouthpiece and the microphone 7 next to the telephone earpiece. When so positioned, the device can send tone signals over the telephone line, by way of the loudspeaker 6 , and can receive signals from the telephone line, by way of the microphone 7 . It may be necessary to adjust the distance between the transducers 6 , 7 to suit the particular handset, by sliding the microphone 7 within the slot 8 .
- the user In use, the user first dials up the remote service that the user wishes to access, on a conventional telephone. When the service answers, it prompts the user, by means of a voice message, to place the activated device over the telephone handset.
- the remote service and the device then exchange tone signals, similar to conventional modems establishing a link with each other: the remote service repeatedly sends a tone signal to the device until the device responds. This informs the remote service that the device is now ready.
- the remote service then transmits a randomly-generated challenge to the device, as a series of tones over the telephone line.
- the device receives the challenge and passes it to the smart card.
- the smart card encrypts the challenge, using a private key stored in the smart card, so as to generate a response.
- the device then transmits the response to the remote service, as a series of tones over the telephone line.
- the device also transmits the user's identity.
- the remote service When the remote service receives the response, it decrypts the response using the user's public key, and compares it with the challenge. If they match, the user's identity is authenticated, and the remote service returns a confirmation message to the device. When the device receives this confirmation message, it illuminates the LED 9 continuously, to indicate that the user may now remove the device from the handset. Access to the service can now proceed in the normal manner.
- the device described above has no keypad or display, and is dedicated solely to the function of authenticating the user, and can therefore be very simple and cheap.
- a keypad 10 may be provided, to allow the user to enter a PIN to activate the smart card. This allows the user to prove to the smart card that it is in the possession of the right person.
- the keypad may be a conventional flat rubber mat type keypad.
- the telephone dialling keypad may be used to enter the user's PIN into the device. This involves the risk of the tones being overheard. However, it also allows the PIN to be checked by the remote service, which can, if required, take action if it detects more than a predetermined number of attempts to enter a wrong PIN.
- the device could incorporate a biometric sensor, for example a fingerprint reading device.
- a biometric sensor for example a fingerprint reading device.
- the biometric data together with data securely stored on the smart card (and/or data stored in the remote service), would be used to authenticate that the card was in the possession of its rightful owner, and would thus eliminate the need for entry of the user's PIN.
- a related possibility would be to use voice-recognition technology, either via the microphone on the device, or over the telephone line.
- the device may contain only one audio transducer, which is used for both transmitting and receiving. This would require one or more further LEDs, to indicate whether the device is to be held against the earpiece or mouthpiece of the telephone.
- audio transducer may be used instead of using a microphone transducer, an induction device may be used to pick up electrical signals directly from the telephone handset. This option may not be suitable for some types of telephone.
- the device may include a plurality of LEDs. For example, one LED may be used to indicate that the device is ready, and a second LED to indicate that the device can be removed from the telephone. Another possibility would be to use a single, multi-colour LED, although this might cause problems for colour-blind people.
- a contactless smart card could be used instead of a contact-connected smart card. This would significantly improve the reliability of the device by eliminating the possibility of dirty contacts.
- the device comprises two parts.
- the device may comprise a main body 11 with two flaps 12 , 13 , connected to the main body by hinges 14 , 15 , and with audio transducers 16 , 17 mounted in the flaps.
- the remote service and the device exchange tone signals in order to establish a link with each other, before the remote service sends a challenge.
- the signal standards were pre-defined (e.g. bit rate, modulation type etc.) it would be possible for the remote service just to send the challenge repeatedly, until it receives a response.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Signal Processing (AREA)
- Telephone Set Structure (AREA)
Abstract
Description
Claims (5)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB9811446 | 1998-05-29 | ||
GBGB9811446.5A GB9811446D0 (en) | 1998-05-29 | 1998-05-29 | Authentication device |
Publications (1)
Publication Number | Publication Date |
---|---|
US6404862B1 true US6404862B1 (en) | 2002-06-11 |
Family
ID=10832831
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/311,512 Expired - Fee Related US6404862B1 (en) | 1998-05-29 | 1999-05-13 | Authentication device |
Country Status (2)
Country | Link |
---|---|
US (1) | US6404862B1 (en) |
GB (2) | GB9811446D0 (en) |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030005294A1 (en) * | 2001-06-29 | 2003-01-02 | Dominique Gougeon | System and method for restoring a secured terminal to default status |
US20030157904A1 (en) * | 2002-02-21 | 2003-08-21 | Bloomberg Michael R. | Computer terminals biometrically enabled for network functions and voice communication |
US20040016811A1 (en) * | 2002-04-19 | 2004-01-29 | Cross Match Technologies, Inc. | Mobile handheld code reader and print scanner system and method |
US6742713B1 (en) * | 1999-06-04 | 2004-06-01 | Deutsche Telekom Ag | Access controlled system with acoustic mechanical verification transmitter |
US20050020887A1 (en) * | 2001-10-11 | 2005-01-27 | Jason Goldberg | Medical monitoring device and system |
US20050071197A1 (en) * | 2003-08-07 | 2005-03-31 | Jason Goldberg | Personal health management device, method and system |
US20050243619A1 (en) * | 2004-04-30 | 2005-11-03 | Brown Michael K | Device authentication |
US20060095788A1 (en) * | 2004-11-03 | 2006-05-04 | Alexandre Bronstein | Authenticating a login |
US20060147000A1 (en) * | 2004-12-22 | 2006-07-06 | Schlumberger Omnes, Inc. | Method for in-band entity authentication via telephone |
US20120030480A1 (en) * | 2007-12-18 | 2012-02-02 | Sony Ericsson Mobile Communications Japan, Inc. | Battery pack and electronic apparatus |
US8882666B1 (en) | 1998-05-08 | 2014-11-11 | Ideal Life Inc. | Personal health monitoring and/or communication system |
US8950680B2 (en) | 2007-11-28 | 2015-02-10 | Visa U.S.A. Inc. | Multifunction removable cover for portable payment device |
US9256910B2 (en) | 2003-07-15 | 2016-02-09 | Ideal Life, Inc. | Medical monitoring/consumables tracking device |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4430728A (en) * | 1981-12-29 | 1984-02-07 | Marathon Oil Company | Computer terminal security system |
US4694492A (en) * | 1984-11-09 | 1987-09-15 | Pirmasafe, Inc. | Computer communications security control system |
US5351296A (en) * | 1993-03-29 | 1994-09-27 | Niobrara Research & Development Corporation | Financial transmission system |
WO1995004328A1 (en) * | 1993-07-30 | 1995-02-09 | Intellect Australia Pty. Ltd. | Device and method for ic cards |
US5406619A (en) * | 1992-04-06 | 1995-04-11 | At&T Corp. | Universal authentication device for use over telephone lines |
US5740232A (en) * | 1994-05-06 | 1998-04-14 | France Telecom | Smart card based system for telephone-securized transactions |
US5770849A (en) * | 1996-08-23 | 1998-06-23 | Motorola, Inc. | Smart card device with pager and visual image display |
US5987155A (en) * | 1997-10-27 | 1999-11-16 | Dew Engineering And Development Limited | Biometric input device with peripheral port |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
IL64675A0 (en) * | 1981-12-30 | 1982-03-31 | Greenberg Avigdor | Data verification system |
GB8525161D0 (en) * | 1985-10-11 | 1985-11-13 | Blackwell V C | Personalised identification device |
-
1998
- 1998-05-29 GB GBGB9811446.5A patent/GB9811446D0/en not_active Ceased
-
1999
- 1999-05-06 GB GB9910440A patent/GB2337894B/en not_active Expired - Fee Related
- 1999-05-13 US US09/311,512 patent/US6404862B1/en not_active Expired - Fee Related
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4430728A (en) * | 1981-12-29 | 1984-02-07 | Marathon Oil Company | Computer terminal security system |
US4694492A (en) * | 1984-11-09 | 1987-09-15 | Pirmasafe, Inc. | Computer communications security control system |
US5406619A (en) * | 1992-04-06 | 1995-04-11 | At&T Corp. | Universal authentication device for use over telephone lines |
US5351296A (en) * | 1993-03-29 | 1994-09-27 | Niobrara Research & Development Corporation | Financial transmission system |
WO1995004328A1 (en) * | 1993-07-30 | 1995-02-09 | Intellect Australia Pty. Ltd. | Device and method for ic cards |
US5740232A (en) * | 1994-05-06 | 1998-04-14 | France Telecom | Smart card based system for telephone-securized transactions |
US5770849A (en) * | 1996-08-23 | 1998-06-23 | Motorola, Inc. | Smart card device with pager and visual image display |
US5987155A (en) * | 1997-10-27 | 1999-11-16 | Dew Engineering And Development Limited | Biometric input device with peripheral port |
Cited By (29)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8882666B1 (en) | 1998-05-08 | 2014-11-11 | Ideal Life Inc. | Personal health monitoring and/or communication system |
US6742713B1 (en) * | 1999-06-04 | 2004-06-01 | Deutsche Telekom Ag | Access controlled system with acoustic mechanical verification transmitter |
US6983364B2 (en) * | 2001-06-29 | 2006-01-03 | Hewlett-Packard Development Company, Lp. | System and method for restoring a secured terminal to default status |
US20030005294A1 (en) * | 2001-06-29 | 2003-01-02 | Dominique Gougeon | System and method for restoring a secured terminal to default status |
US20050020887A1 (en) * | 2001-10-11 | 2005-01-27 | Jason Goldberg | Medical monitoring device and system |
US10313501B2 (en) | 2002-02-21 | 2019-06-04 | Bloomberg Finance L.P. | Computer terminals biometrically enabled for network functions and voice communication |
WO2003073378A3 (en) * | 2002-02-21 | 2004-05-27 | Bloomberg Lp | Computer terminals biometrically enabled for network functions and voice communication |
US10979549B2 (en) | 2002-02-21 | 2021-04-13 | Bloomberg Finance L.P. | Computer terminals biometrically enabled for network functions and voice communication |
WO2003073378A2 (en) * | 2002-02-21 | 2003-09-04 | Bloomberg L.P. | Computer terminals biometrically enabled for network functions and voice communication |
US9912793B2 (en) | 2002-02-21 | 2018-03-06 | Bloomberg Finance L.P. | Computer terminals biometrically enabled for network functions and voice communication |
US9378347B2 (en) | 2002-02-21 | 2016-06-28 | Bloomberg Finance L.P. | Computer terminals biometrically enabled for network functions and voice communication |
US7418255B2 (en) * | 2002-02-21 | 2008-08-26 | Bloomberg Finance L.P. | Computer terminals biometrically enabled for network functions and voice communication |
US20030157904A1 (en) * | 2002-02-21 | 2003-08-21 | Bloomberg Michael R. | Computer terminals biometrically enabled for network functions and voice communication |
US20040016811A1 (en) * | 2002-04-19 | 2004-01-29 | Cross Match Technologies, Inc. | Mobile handheld code reader and print scanner system and method |
US7073711B2 (en) * | 2002-04-19 | 2006-07-11 | Cross Match Technologies, Inc. | Mobile handheld code reader and print scanner system and method |
US9256910B2 (en) | 2003-07-15 | 2016-02-09 | Ideal Life, Inc. | Medical monitoring/consumables tracking device |
US8571880B2 (en) | 2003-08-07 | 2013-10-29 | Ideal Life, Inc. | Personal health management device, method and system |
US20050071197A1 (en) * | 2003-08-07 | 2005-03-31 | Jason Goldberg | Personal health management device, method and system |
US8156336B2 (en) | 2004-04-30 | 2012-04-10 | Research In Motion Limited | Device authentication |
US20110191585A2 (en) * | 2004-04-30 | 2011-08-04 | Research In Motion Limited | Device Authentication |
US20100106970A1 (en) * | 2004-04-30 | 2010-04-29 | Research In Motion Limited | Device authentication |
US7647498B2 (en) * | 2004-04-30 | 2010-01-12 | Research In Motion Limited | Device authentication |
US20050243619A1 (en) * | 2004-04-30 | 2005-11-03 | Brown Michael K | Device authentication |
US8171303B2 (en) * | 2004-11-03 | 2012-05-01 | Astav, Inc. | Authenticating a login |
US20060095788A1 (en) * | 2004-11-03 | 2006-05-04 | Alexandre Bronstein | Authenticating a login |
US20060147000A1 (en) * | 2004-12-22 | 2006-07-06 | Schlumberger Omnes, Inc. | Method for in-band entity authentication via telephone |
US8950680B2 (en) | 2007-11-28 | 2015-02-10 | Visa U.S.A. Inc. | Multifunction removable cover for portable payment device |
US20120030480A1 (en) * | 2007-12-18 | 2012-02-02 | Sony Ericsson Mobile Communications Japan, Inc. | Battery pack and electronic apparatus |
US8424092B2 (en) * | 2007-12-18 | 2013-04-16 | Mitsumi Electric Co., Ltd. | Electronic apparatus for authenticating a battery pack |
Also Published As
Publication number | Publication date |
---|---|
GB2337894B (en) | 2000-05-10 |
GB2337894A (en) | 1999-12-01 |
GB9910440D0 (en) | 1999-07-07 |
GB9811446D0 (en) | 1998-07-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6404862B1 (en) | Authentication device | |
US6141436A (en) | Portable communication device having a fingerprint identification system | |
US5787154A (en) | Universal authentication device for use over telephone lines | |
US6484260B1 (en) | Personal identification system | |
ES2534047T3 (en) | Smart card with microphone | |
US5050207A (en) | Portable automated teller machine | |
TW200624B (en) | A universal authentication device for use over telephone lines | |
US5157717A (en) | Portable automated teller machine | |
JP5112700B2 (en) | A system for identifying individuals in electronic transactions | |
US8161290B2 (en) | Security for a personal communication device | |
EP0741884B8 (en) | Funds transaction device | |
AU726397B2 (en) | Pocket encrypting and authenticating communications device | |
US20080148059A1 (en) | Universal, Biometric, Self-Authenticating Identity Computer Having Multiple Communication Ports | |
WO1999056429A1 (en) | Personal identification system and method | |
MX2008010786A (en) | A method and apparatus for a token. | |
WO2005122462A1 (en) | System and method for portable authentication | |
US7013393B1 (en) | Universal intelligent card for secure access to system functions | |
EP2774401B1 (en) | Device for mobile communication | |
WO2000035178A2 (en) | Method and device for access control by use of mobile phone | |
US5467475A (en) | Data collection-transmission apparatus and data collection system | |
JP2003253940A (en) | Keyless entry system | |
JP3457930B2 (en) | Fingerprint authentication mobile phone | |
JP2002047840A (en) | Switching mechanism with biometrics data authentification device, switching method jointly using biometrics data authentification, and recording medium having switching program jointly using biometrics data authentification recorded therein | |
CN206741546U (en) | A kind of dynamic cipher device with front camera | |
US20040088547A1 (en) | Method and apparatus to secure online transactions over the phone |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: INTERNATIONAL COMPUTERS LIMITED, UNITED KINGDOM Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:HOLT, NICHOLAS PETER;REEL/FRAME:009965/0582 Effective date: 19990430 |
|
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
FPAY | Fee payment |
Year of fee payment: 8 |
|
REMI | Maintenance fee reminder mailed | ||
LAPS | Lapse for failure to pay maintenance fees | ||
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20140611 |